CSA AI Summit
The Cloud Security Alliance Virtual AI Summit brings together experts from around the world to provide key insights on how generative AI can benefit cybersecurity, how malicious attackers are using it and guidelines for responsible usage. The explosive growth of ChatGPT is due in large part to its delivery via the cloud, obligating CSA and its community to take a leading role in articulating the best practices and assurance ecosystem for AI as...
CyberWeek 2022
CYBERSCOOP PRESENTS CYBERWEEK Join over 10,000 influential leaders from the cybersecurity community at CyberWeek, the nation’s largest week-long cybersecurity festival focused on digital threats, best practices and the U.S. government’s work on improving cyberspace. CyberWeek is an annual movement bringing together top C-Suite leaders from major technology companies, state and federal government agencies, and other influential deci...
October 17-21, 2022
Organizer:
CyberScoop Location:
Virtual
Insights for Impact FAST 2022 Monthly S...
GSA’s Federal Acquisition Service Training (FAST2022) monthly conference series continues with Professional Services: Technical and Engineering Requirements on April 20th at 1 p.m. ET. Learn about best practices for developing requirements for technical and engineering services and tools you can use to make your acquisition a success Check out the full lineup of the FAST2022 monthly conference series at www.gsa.gov/fast.
April 20, 2022
Organizer:
GSA Location:
Webcast
Americas Healthcare Virtual Test Drive
Presenting a condensed, hands-on tour of the integrated power of Forescout to drastically reduce risk by removing security blind spots, streamlining accurate asset management and proactively combating threats, all while preserving network integrity, system uptime and patient service delivery. During the 90-minute virtual test drive, your instructor will run you through four laps to experience: Enterprise Visibility and Ransomware Response ...
April 12, 2022
Organizer:
Forescout Location:
Virtual
FCW Workshop: Defense Readiness
The nation’s defense systems and capabilities are challenged as never before-- on the ground, in the air, on the seas, in cyberspace and real space. The military must rise to those challenges on all those fronts to ensure the nation is secure. Information technology remains warfighters’ and defenders’ powerful primary tool for their jobs. From cloud computing, cybersecurity and artificial intelligence, to machine learning and...
March 23, 2022
Organizer:
GovExec Location:
Virtual Event, DC
FCW Workshop: Public Safety
From wildfires and hurricanes to increasing crime rates and the continuing pandemic, public safety organizations at all levels of government find themselves spread thin these days. However, a continued wave of technology innovations can help fill their need for better data, quicker response and effective delivery of services. The move of many public safety organizations to the cloud has opened new options for using and sharing operational data...
February 15, 2022
Organizer:
GovExec Location:
Virtual
ICIT 2021 Fall Briefing -- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
Federal Insights Exchange Featuring Dep...
USPTO CIO Jamie Holcombe and Product Line Leaders to update industry on the progress of modernization efforts and its Agile transformation along product lines. To satisfy new customer demands, the United States Patent and Trademark Office (USPTO) embarked on an organizational transformation to change how they deliver enterprise IT. This journey encompasses the New Ways of Working (NWOW) and new, scaled Agile practices with a focus on customer...
April 22, 2021
Organizer:
ACT-IAC Location:
Virtual
Zero Trust: Beyond the Moat
As technology evolves, so do the threats to its security. The remote work shift caused by the continuing pandemic has pressed security teams to reassess how they verify and allow access. Zero Trust is a strategy, not a product, which reimagines the way access is granted to users, to data and to applications. Devices, which used to be central to identity, now include personal computers and home internet connections, which are not government iss...
Data, Digital Identity and Privacy: How...
The federal government has been working to update its policies, architectures and frameworks around digital identity for some time. OMB revised its Identity Credential and Access Management guide in May of 2019 and that National Institute for Standards and Technology has been working on an updated version of its guidance on security and privacy controls for information systems. Then, the pandemic hit, and all programs went into overdrive as ag...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.